Risk

7/3/2018
08:32 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Jumios Netverify Solutions Win Gold and Bronze in Security Software

Award-winning technology recognized for market leading accuracy, machine learning and global growth.

PALO ALTO, Calif., July 03, 2018 (GLOBE NEWSWIRE) -- Jumio, the leading AI-powered trusted identity as a service provider, announced today that Network Products Guide, the industry's leading technology research and advisory guide, named its Netverify® solution a Gold winner in Information Security & Risk Management and Bronze winner for Security Software in the 13th Annual 2018 IT World Awards®.

Jumio’s Netverify solution is the global leader in trusted identity as a service and combines ID Verification, Identity Verification and Document Verification to confirm the real-world identity of online consumers. Netverify verifies ID documents issued by over 200 countries in real-time web and mobile transactions. Jumio’s award-winning technology was recognized because of its:

  • Market Leading Accuracy: Through a combination of computer vision, machine learning, biometrics, augmented intelligence and human review, Jumio has enabled the highest level of accuracy in deterring fraud while complying with AML, KYC, PSD2 and GDPR.
     
  • Machine Learning at Scale: Machine learning for online identity verification relies on having a large (ideally massive) database of good and bad (i.e., fraudulent) transactions. The larger the dataset, the smarter the algorithms. Jumio has performed over 120 million online verifications and has the largest database of identity verification transactions training its algorithms.
     
  • Global Growth: In Q1 2018, Jumio’s sales grew almost 400 percent year-over-year compared to the same quarter last year and it marked the fifth consecutive quarter of increased sales.

“We live in an increasingly digital world and it’s imperative that organizations verify a consumer’s digital identity matches their physical identity when conducting business online to mitigate fraud,” said Stephen Stuut, CEO of Jumio. “These awards from Network Products Guide are further validation that our Netverify solution is the most accurate and advanced solution on the market. The threat of data breaches has shaken the trust of consumers, and as a result, online identity verification is now a critical must-have for most online organizations.”

Jumio has had continuous momentum in 2018, as the company and its Netverify solution have won a number of industry awards including the 14th Annual Info Security Product Guide’s 2018 Global Excellence Awards®, 2018 Tech Trailblazers Awards, 2018 Cybersecurity Excellence Awards and Cyber Defense Magazines 2018 Infosec Awards.

Jumio will be honored in San Francisco on Monday, July 30, 2018 during the annual SVUS Red Carpet Awards Ceremony Dinner.

To learn more about Jumio’s award-winning solution, please visit: www.jumio.com/trusted-identity/netverify/.

About Jumio
When identity matters, trust Jumio. Jumio is the creator of Netverify® which enables businesses to increase customer conversions while providing a seamless customer experience and reducing fraud. By combining the three core solutions of ID Verification, Identity Verification and Document Verification, organizations now have a complete solution that allows them to establish the real-world identity of the consumer.

Leveraging advanced technology including biometric facial recognition, machine learning, artificial intelligence and human review, Jumio helps customers to meet regulatory compliance including KYC, AML and GDPR and tie the digital identity to the physical world. Jumio has verified more than 120 million identities issued by over 200 countries from real time web and mobile transactions. Jumio’s solutions are used by leading companies in the financial services, sharing economy, online gaming, cryptocurrency, higher education, retail, and travel sectors.

Based in Palo Alto, Jumio operates globally with offices in the US, Europe, and Asia Pacific and has been the recipient of numerous awards for innovation. For more information, please visit www.jumio.com.

About NPG’s IT World Awards
As industry’s leading technology research and advisory publication, Network Products Guide plays a vital role in keeping decision makers and end-users informed of the choices they can make in all areas of information technology. The Annual IT World Awards is part of the SVUS Awards® recognition program from Silicon Valley in the United States of America which also includes other programs such as CEO World Awards, Consumer World Awards, Customer Sales and Service World Awards, Golden Bridge Awards, Globee Awards, Info Security PG’s Global Excellence Awards, Pillar World Awards, PR World Awards, and Women World Awards. To learn more, visit www.networkproductsguide.com

Media Contacts
U.S. Media Contact
Jacquelyn Daane
10Fold Communications
[email protected]
415-800-5369

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Cyberspace is much less secure than my old lamp.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6681
PUBLISHED: 2018-07-17
Abuse of Functionality vulnerability in the web interface in McAfee Network Security Management (NSM) 9.1.7.11 and earlier allows authenticated users to allow arbitrary HTML code to be reflected in the response web page via appliance web interface.
CVE-2018-13864
PUBLISHED: 2018-07-17
A directory traversal vulnerability has been found in the Assets controller in Play Framework 2.6.12 through 2.6.15 (fixed in 2.6.16) when running on Windows. It allows a remote attacker to download arbitrary files from the target server via specially crafted HTTP requests.
CVE-2018-14338
PUBLISHED: 2018-07-17
samples/geotag.cpp in the example code of Exiv2 0.26 misuses the realpath function on POSIX platforms (other than Apple platforms) where glibc is not used, possibly leading to a buffer overflow.
CVE-2018-14337
PUBLISHED: 2018-07-17
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
CVE-2018-14329
PUBLISHED: 2018-07-17
In HTSlib 1.8, a race condition in cram/cram_io.c might allow local users to overwrite arbitrary files via a symlink attack.